CVE-2018-3211: Java Usage Tracker Local Elevation of Privilege on Windows

...We found design flaw/weakness in Java Usage Tracker that can enable hackers to create arbitrary files, inject attacker-specified parameters, and elevate local privileges. In turn, these can be...more…

How to Use Java – If You Must

...With Java going through another embarrassing zero-day vulnerability recently, it has become a common bit of advice for users to “uninstall Java”. In general, this is sound advice. If...more…

How to Protect Your Devices from a Fast Spreading Java Virus

...Last week, a new security issue surfaced for a popular programming language known as Java. This Java security issue is classified as a zero-day threat, and it spreads malicious...more…

Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor

...which is http://www.{BLOCKED}s.com/public/meeting/index.html, which results to the downloading and loading of the malicious Java applet (JAVA_GONDY.A). It then passes some parameters, which is then used to download BKDR_POISON.BLW. Based on...more…

Java Zero-Day Exploit In The Wild, Spreading Ransomware

...A new zero-day exploit in Java has been found in the wild. Currently, this exploit is being used by toolkits like the Blackhole Exploit Kit (BHEK) and the Cool...more…

Adwind: FAQ

...as Adwind RAT (Remote Access Tool), AlienSpy, Frutas, Unrecom, Sockrat, JSocket, and jRat. It is a backdoor available for purchase, and is written entirely in Java which makes it cross-platform....more…

About site

This is experimental project, which search automatically antivirus, security, malware, etc. news and alerts. If you want add/delete source or post, let us know. We will add/delete it. We'd like make place, where you can find security information from various sources with correct backlink back to source.